Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

917 results
  1. ... contexts much work has been done on this problem. In CONGEN we rely on the standard protection mechanisms built into the computer system, but we will need more security if we are to satisfy users in chemical ...
  2. ... on the standard protection mechanisms built into the computer system, but we ... into a single problem solver. In the context of DENDRAL this combination ...
  3. ... 7(3):35-42 How to establish a computer security program. Isaacson G. Health Care ... medical record systems. Stratmann WC, et al. Health Serv Res 1982 ...
  4. ... Mod Hosp 108: 25-6 My 67 New computer system uses hospital's cost ... this year, social security officials indicate. (N) Mod Nurs Home Admin 21: ...
  5. ... of management input in the development of information systems security. Haeckel DA, et al. Manage Rev 1983 Aug; 72(8):26-8, 38-41 Security problems proliferates along with personal computers. Ward GM, et al. Manage Rev 1983 Jul; ...
  6. ... the computer systems to administer mandatory individual accounts. Problems ... Security reform have received considerable attention, most analysis has ...
  7. ... 8, Mar-Apr 79 Space age space saving—computer style. Bryda S. J Patient Acc ... security microdata files for research and statistical purposes. Alexander ...
  8. ... multilevel access model in the development of a security infrastructure for a ... form: a computer-generated chart document. Prophet CM. Proc Annu Symp ...
  9. ... Don Mills) 1985 Mar; 1(1):L29—31 Computer security risk analysis. ... system: an important element in successful prehospital emergency medical ...
  10. ... 6):49 Theft in hospitals is a continuing problem. NZ Hosp 1982 May;34(4):21-2 ... Programming a stop to computer fraud. Hickman JR. Tex Hosp 1983 Jun;39( ...
first · previous · 1 · 2 · 3 · 4 · 5 · 6 · 7 · 8 · 9 · 10 · next · last